As a fictitious healthcare company's security professional, I regularly updated a file listing employees authorized to access restricted content based on their handling of patient records. Access was ...